Security Management Guide (G06.29+, H06.08+, J06.03+)

Glossary
Security Management Guide 522283-021
Glossary - 9
system operator
system operator. The person (or persons) responsible for the routine operations necessary
to keep a system functioning. Such operations can include daily or weekly backups,
performing a system load after an extended power outage, and handling user requests
or questions.
TACL. Abbreviation for HP Tandem Advanced Command Language, the user interface to
the Guardian environment. TACL is both a command interpreter and a command
language. Users can write programs in TACL that perform complex tasks simply or
provide a consistent user interface across independently programmed applications.
TACL macro. Another name for a program written in TACL instructions. The TACL
Reference Manual describes TACL macros.
TACLCSTM file. A file containing a TACL macro in a user’s default logon subvolume. This
macro is automatically executed whenever the user logs on. The macro can be
designed to set up an environment for an individual user or to put the user under the
control of an application.
TACLLOCL. A TACL macro in the $SYSTEM.SYSTEM subvolume. This macro is
automatically executed when any user logs on. The macro can be designed to set up
an environment for all users or to put them all under the control of an application.
tape library. A collection of magnetic tapes to store information off line. Typically, backups
and infrequently used databases are stored in a tape library.
terminal. A keyboard and video screen or hardcopy device attached to a communication
link that serves as the interface between a user and the computer system. Terminals
can also have authentication hardware to prevent unauthorized access.
transaction count. A number that is normally incremented by one for each operation
performed by a user. A user can write down the number and later validate that no
unknown operations have taken place during his or her absence.
trap door. A portion of code secretly placed into a section of an application program that
allows an intruder to access a database or system by triggering a predefined series of
events.
Trojan horse. A program that apparently performs normal operations for a user while
secretly t
aking advantage of the user’s authorizations to gain access for an intruder.
trusted facility. A computer facility (site) where the computer system or systems achieve
an accepted level of security, and the security policies and procedures are in place and
operating.
user. A person accessing the computer system through an interactive interface.
user ID. A pair of numbers (such as 12,201) associated with a user or class of users. For
each user ID, there is a unique user name, and for each unique user name, there is a
user ID.